VYPR
High severity8.8NVD Advisory· Published Mar 26, 2026· Updated Mar 31, 2026

CVE-2026-33622

CVE-2026-33622

Description

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab v0.8.3 through v0.8.5 allow arbitrary JavaScript execution through POST /wait and POST /tabs/{id}/wait when the request uses fn mode, even if security.allowEvaluate is disabled. POST /evaluate correctly enforces the security.allowEvaluate guard, which is disabled by default. However, in the affected releases, POST /wait accepted a user-controlled fn expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to fn mode in /wait that already exists on /evaluate, while preserving the non-code wait modes. As of time of publication, a patched version is not yet available.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/pinchtab/pinchtab/cmd/pinchtabGo
>= 0.8.3, <= 0.8.5
github.com/pinchtab/pinchtabGo
>= 0.8.3

Affected products

1
  • cpe:2.3:a:pinchtab:pinchtab:*:*:*:*:*:*:*:*
    Range: >=0.8.3,<=0.8.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.